7.5
CVE-2016-2161
- EPSS 39.61%
- Veröffentlicht 27.07.2017 21:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle security@apache.org
- Teams Watchlist Login
- Unerledigt Login
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Apache ≫ HTTP Server Version2.4.0
Apache ≫ HTTP Server Version2.4.1
Apache ≫ HTTP Server Version2.4.2
Apache ≫ HTTP Server Version2.4.3
Apache ≫ HTTP Server Version2.4.6
Apache ≫ HTTP Server Version2.4.7
Apache ≫ HTTP Server Version2.4.8
Apache ≫ HTTP Server Version2.4.9
Apache ≫ HTTP Server Version2.4.10
Apache ≫ HTTP Server Version2.4.12
Apache ≫ HTTP Server Version2.4.14
Apache ≫ HTTP Server Version2.4.16
Apache ≫ HTTP Server Version2.4.19
Apache ≫ HTTP Server Version2.4.20
Apache ≫ HTTP Server Version2.4.21
Apache ≫ HTTP Server Version2.4.22
Apache ≫ HTTP Server Version2.4.23
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 39.61% | 0.972 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-823 Use of Out-of-range Pointer Offset
The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.